액세스는 Google의 표준 자동화 시스템 및 코드에서 시작됩니다.
이러한 시스템 액세스는 코드 승인으로 검증됩니다. 이를 통해 프로덕션에 체크인되었고 확인된 소스 코드 소유자를 포함한 다자간 보안 및 개인 정보 보호 검토가 적용되는 코드에서 작업이 시작되는지 확인합니다.
[[["이해하기 쉬움","easyToUnderstand","thumb-up"],["문제가 해결됨","solvedMyProblem","thumb-up"],["기타","otherUp","thumb-up"]],[["이해하기 어려움","hardToUnderstand","thumb-down"],["잘못된 정보 또는 샘플 코드","incorrectInformationOrSampleCode","thumb-down"],["필요한 정보/샘플이 없음","missingTheInformationSamplesINeed","thumb-down"],["번역 문제","translationIssue","thumb-down"],["기타","otherDown","thumb-down"]],["최종 업데이트: 2025-09-04(UTC)"],[[["\u003cp\u003eAccess Transparency logs are generated when Google personnel access your content in supported services, with specific exceptions.\u003c/p\u003e\n"],["\u003cp\u003eAccess is not logged if Google is legally prohibited from notifying you, as detailed in the Google Cloud Transparency Report.\u003c/p\u003e\n"],["\u003cp\u003eAccess by Google personnel granted through your Identity and Access Management (IAM) policy is logged in Cloud Audit Logs, not Access Transparency logs.\u003c/p\u003e\n"],["\u003cp\u003eAccess to data that isn't considered Customer Data, such as aggregated resource sizes, will not generate Access Transparency logs.\u003c/p\u003e\n"],["\u003cp\u003eAccess from Google's standard automated systems and code, verified through code authorization and security reviews, are excluded from Access Transparency logs.\u003c/p\u003e\n"]]],[],null,["# Access Transparency exclusions\n==============================\n\nAccess Transparency logs are generated when Google personnel access content that you've\nuploaded into an Access Transparency\n[supported service](/assured-workloads/access-transparency/docs/supported-services),\n**except** in the following scenarios:\n\n1. Google is legally prohibited from notifying you of the access. For details,\n refer to Google Cloud's\n [Transparency Report](https://transparencyreport.google.com/user-data/enterprise?enterprise_legal_process_breakdown=product:1;authority:;series:requests,accounts,compliance&lu=enterprise_legal_process_breakdown).\n\n2. You've granted the Google personnel access to your content by using your\n Identity and Access Management (IAM) policy; their activities are recorded in\n [Cloud Audit Logs](/logging/docs/audit) (when enabled), not Access Transparency logs.\n\n3. The access doesn't target [Customer Data](/terms/service-terms); for example,\n Google personnel querying for the average size of records in a database that\n contains content from multiple Google Cloud customers.\n\n4. The content in question is a public resource identifier or a\n [resource name](https://google.aip.dev/122). For example:\n\n - Google Cloud project IDs\n - Cloud Storage bucket names\n - Compute Engine VM names\n - Google Kubernetes Engine cluster names\n - BigQuery resource names (including datasets, tables, and reservations)\n5. The access originates from Google's standard automated systems and code.\n These system accesses are validated by code authorization, which verifies\n that the job originates from code that was checked into production and\n subject to a multi-party security and privacy review, including a verified\n source code owner.\n\nWhat's next\n-----------\n\n- Learn about the [services that Access Transparency supports](/assured-workloads/access-transparency/docs/supported-services)."]]